llm-security

Installation
SKILL.md

LLM Security

Use When

  • Use when building any AI-powered feature or LLM-integrated endpoint — covers OWASP Top 10 for LLMs, trust boundaries, prompt injection defense, data leakage prevention, input/output sanitisation, and security checklist
  • The task needs reusable judgment, domain constraints, or a proven workflow rather than ad hoc advice.

Do Not Use When

  • The task is unrelated to llm-security or would be better handled by a more specific companion skill.
  • The request only needs a trivial answer and none of this skill's constraints or references materially help.

Required Inputs

  • Gather relevant project context, constraints, and the concrete problem to solve.
  • Confirm the desired deliverable: design, code, review, migration plan, audit, or documentation.

Workflow

Related skills
Installs
4
GitHub Stars
12
First Seen
Apr 8, 2026